Microsoft has formally acknowledged that its August 12, 2025 cumulative security update is responsible for severe stuttering, lag and choppy audio/video in NDI-based workflows on affected Windows 11 and Windows 10 builds, and vendors and community engineers have published an immediate—but imperfect—workaround while Redmond investigates a permanent fix. (learn.microsoft.com)
The August 12, 2025 Patch Tuesday rollup for Windows shipped as combined servicing packages for multiple branches; the Windows 11 24H2 cumulative is distributed as KB5063878 (OS Build 26100.4946), while companion packages for Windows 10 (and other Windows 11 branches) were published the same day. Those rollups fixed a large set of security flaws, including a publicly disclosed Kerberos elevation‑of‑privilege bug, but they also coincided with multiple regressions that quickly surfaced in the field. (bleepingcomputer.com)
One of those regressions—now formally described in Microsoft’s Release Health entries—affects NDI (Network Device Interface) streams when configured to use NDI’s default transport, RUDP (Reliable UDP). The vendor‑recommended mitigation is to change NDI’s Receive Mode on affected receiving hosts to Single TCP or UDP (Legacy) until Microsoft ships a corrective update. (learn.microsoft.com) (m.vmix.com)
The regression manifests as:
Community and vendor telemetry show the fingerprint is consistent: when NDI streams use RUDP, flows can abruptly degrade; traffic sent via UDP (Legacy) or Single TCP appears unaffected in reproduced tests. That pattern points to a transport‑layer interaction rather than a general application bug in OBS, vMix or NDI Tools. (m.vmix.com, theregister.com)
For production teams the path forward is one of mitigation and prudence: apply the temporary transport change, validate it under show conditions, and balance the security benefits of the August rollup against the very real availability needs of live workflows. Keep an eye on Microsoft’s Release Health updates and vendor advisories for the arrival of a targeted fix, and document every decision to delay or alter patching—both to preserve security posture and to protect live production continuity. (m.vmix.com)
Source: RS Web Solutions Microsoft Confirms Lag Issues in Windows 11 24H2 and Windows 10
Background / Overview
The August 12, 2025 Patch Tuesday rollup for Windows shipped as combined servicing packages for multiple branches; the Windows 11 24H2 cumulative is distributed as KB5063878 (OS Build 26100.4946), while companion packages for Windows 10 (and other Windows 11 branches) were published the same day. Those rollups fixed a large set of security flaws, including a publicly disclosed Kerberos elevation‑of‑privilege bug, but they also coincided with multiple regressions that quickly surfaced in the field. (bleepingcomputer.com)One of those regressions—now formally described in Microsoft’s Release Health entries—affects NDI (Network Device Interface) streams when configured to use NDI’s default transport, RUDP (Reliable UDP). The vendor‑recommended mitigation is to change NDI’s Receive Mode on affected receiving hosts to Single TCP or UDP (Legacy) until Microsoft ships a corrective update. (learn.microsoft.com) (m.vmix.com)
Why this matters: NDI, multi‑PC production, and what broke
NDI is a widely used, low‑latency, high‑quality IP video protocol used by broadcasters, production houses, corporate AV teams, and streamers. Typical multi‑PC workflows use one machine to capture (often via Display Capture) and another to encode or mix; NDI transports full‑resolution video and audio across local networks so that complex productions can be built from commodity hardware.The regression manifests as:
- Severe stuttering and dropped frames in live NDI feeds.
- Choppy or out‑of‑sync audio/video, particularly when Display Capture is the source.
- Visible problems even on low‑bandwidth, low‑loss LANs, indicating a transport/processing timing fault rather than pure congestion. (learn.microsoft.com)
Community and vendor telemetry show the fingerprint is consistent: when NDI streams use RUDP, flows can abruptly degrade; traffic sent via UDP (Legacy) or Single TCP appears unaffected in reproduced tests. That pattern points to a transport‑layer interaction rather than a general application bug in OBS, vMix or NDI Tools. (m.vmix.com, theregister.com)
Technical primer: RUDP vs UDP vs TCP — why RUDP is sensitive
How the transports differ (short)
- UDP (Legacy): Unreliable datagrams, no retransmissions, minimal overhead. Best for stable LANs where packet loss is rare and low latency is critical.
- TCP (Single TCP): Ordered, reliable byte stream with retransmissions and congestion control; robust but can introduce head‑of‑line blocking that raises latency under loss.
- RUDP (Reliable UDP): An application‑level reliability layer layered on UDP that attempts to combine UDP’s low latency with selective retransmission and pacing to maintain visual quality without the strict ordering penalty of TCP.
Why the August updates likely triggered the regression
Microsoft’s public statement does not include a root cause analysis, but available signals point to a narrow interaction:- The problem appears only with RUDP connections; UDP and TCP flows remain stable in tested environments, suggesting the OS‑level change impacts RUDP’s timing or its expectations of the underlying UDP socket semantics. (learn.microsoft.com)
- The issue reproduces even on low‑utilization networks, which reduces the likelihood the fault is network capacity. That pattern is consistent with timing, retransmission or scheduler changes at the OS socket or kernel network stack level.
The immediate mitigation: change NDI Receive Mode (step‑by‑step)
Vendors and Microsoft recommend changing the NDI Receive Mode on receiving hosts. The change is reversible and does not require uninstalling the security update.- Install the NDI Tools pack on the receiving machine (if not already installed).
- Launch NDI Access Manager.
- Open the Advanced tab.
- Under Receive Mode, select Single TCP or UDP (Legacy) instead of RUDP.
- Click OK and then restart any NDI‑receiving applications (OBS, vMix, Studio Monitor) so they pick up the modified configuration. (bleepingcomputer.com, m.vmix.com)
- Single TCP is the safest universal fallback—it typically eliminates the stutter—but it can add end‑to‑end latency and is vulnerable to head‑of‑line blocking under packet loss, which may be unacceptable for ultra‑low‑latency switchers or tight multi‑camera timing budgets. (windowsforum.com)
- UDP (Legacy) preserves lower latency on clean LANs but sacrifices RUDP’s retransmission and ordering improvements; it’s reasonable on dedicated, low‑loss Ethernet segments. (windowsforum.com)
- After changing Receive Mode, all receiving apps must be restarted, because they read the Access Manager configuration at startup. Plan this carefully for live shows and remote contributors. (windowsforum.com)
Cross‑checking the facts: Microsoft, vendors, and the press
Key load‑bearing facts are corroborated across Microsoft’s Release Health entry, vendor advisories and independent press:- Microsoft’s release health page lists a confirmed entry describing “severe stuttering, lag, and choppy audio/video” when using NDI after installing the August 2025 updates, and recommends the vendor‑provided workaround. (learn.microsoft.com)
- NDI (and vendors using NDI like vMix) published guidance showing the same mitigation—change Receive Mode to Single TCP or UDP (Legacy). Vendor knowledge bases reproduce the step‑by‑step process. (m.vmix.com)
- Independent outlets such as BleepingComputer, Tom’s Guide and The Register independently reported Microsoft’s acknowledgement and reproduced the symptom profile and mitigation, reinforcing that this is a genuine Microsoft‑acknowledged regression and not an isolated third‑party anomaly. (bleepingcomputer.com, tomsguide.com, theregister.com)
Collateral issues in the same Patch Tuesday window
The NDI regression is one of several regressions and deployment headaches that accompanied the August rollups. Other confirmed or broadly reported problems include:- Reset / Recovery failures: Microsoft issued out‑of‑band fixes for reset and cloud recovery regressions affecting certain Windows 10 and Windows 11 servicing families; these were acknowledged and patched with emergency OOB packages. Administrators were advised to avoid using Reset this PC or cloud‑reinstall flows on affected builds until OOB packages were applied. (tomshardware.com)
- WSUS / deployment errors: Enterprises pushing the August LCU via WSUS initially saw installations fail with error 0x80240069; Microsoft addressed distribution issues and offered Known Issue Rollback‑style mitigations. (bleepingcomputer.com)
- Storage anomalies (SSD/HDD): Reports emerged that certain NVMe SSDs—notably some with Phison controllers or DRAM‑less designs—could disappear or become inaccessible under sustained large writes on systems with KB5063878 installed. Vendors including Phison acknowledged investigations and Microsoft engaged with partners. These storage claims are actively investigated and vary across hardware; caution is warranted before concluding causality for every reported device failure. (windowscentral.com, tomshardware.com)
Operational guidance for streamers, AV teams and IT
For creators and small production teams- Apply the NDI Receive Mode workaround on every receiving host as the primary mitigation. It’s the least disruptive fix and preserves the August security updates. (m.vmix.com)
- Test end‑to‑end before going live: restart NDI apps and run a dress rehearsal after changing transport settings to confirm latency and sync meet show requirements. (windowsforum.com)
- If latency tightness is critical and TCP causes unacceptable timing degradation, prefer UDP (Legacy) on dedicated, low‑loss LANs—but monitor for dropped frames because RUDP’s retransmission logic will no longer protect the flow. (windowsforum.com)
- Use pilot rings. Deploy the August updates to a controlled pilot group that includes representative AV/production hardware and NDI workflows. Validate the NDI transport fallback and Observe storage behavior under typical workloads.
- Consider Known Issue Rollback (KIR) or OOB packages where Microsoft has published them for specific problems (for example, out‑of‑band fixes for reset/recovery). Review Microsoft’s guidance for the appropriate servicing family before deploying.
- Do not default to uninstalling security updates on critical servers without a formal risk assessment. The August rollup fixed a high number of vulnerabilities—including a publicly disclosed Kerberos flaw—so delaying patches increases exposure to exploitation. Evaluate compensating controls (network isolation, host hardening) while you pilot mitigations. (bleepingcomputer.com)
- The August rollups addressed a very large set of security issues (reports across outlets vary between ~107 and 119 CVEs depending on whether non‑Windows components are included). Independent outlets list figures in the low‑hundreds; the exact count differs among reports. Patch urgency must be weighed against the operational impact on production workloads. Administrators should document the decision path and accept the residual risk if they temporarily defer an update in a production environment. (bleepingcomputer.com, intruceptlabs.com)
Risk analysis and what to watch for next
Strengths in Microsoft’s response- Rapid acknowledgement: Microsoft elevated the NDI symptom to a Release Health “Confirmed” status within days, giving administrators a clear signal that the company is investigating. (learn.microsoft.com)
- Vendor collaboration: NDI and third‑party vendors quickly published practical mitigations, and vendor documentation (NDI Tools, vMix knowledge base) provides a reproducible mitigation path for teams. (m.vmix.com)
- Root cause transparency: Microsoft has not yet published a low‑level technical analysis explaining precisely which kernel or networking path changed and why it upsets RUDP. Without that, vendors and ISVs cannot confidently predict whether future rollups will reintroduce similar regressions. This raises the specter of recurrence.
- Operational burden: The workaround requires per‑machine configuration changes and restarts. In large campuses, remote contributor setups, and managed AV estates, the administrative overhead and potential for human error are real risks during live events. (windowsforum.com)
- Collateral hardware effects: Storage anomalies reported alongside KB5063878 complicate the choice to reinstall or remove updates. Those storage reports remain partly under independent investigation and must be validated per vendor/firmware model before sweeping remediation decisions are made. (tomshardware.com)
- Watch Microsoft’s Release Health and the update catalog for a subsequent cumulative fix or an out‑of‑band hotfix that specifically addresses the RUDP interaction. Microsoft’s messaging implies the fix will arrive as a servicing update or a KIR-styled mitigation. (learn.microsoft.com)
- Track NDI/vendor documentation for any updates that harden RUDP against OS‑level changes or add automatic fallbacks. If NDI releases a patched transport implementation, that could remove the need to change Receive Mode. (m.vmix.com)
- Monitor storage vendor advisories and OEM firmware updates if you operate drives implicated in community tests; treat heavy sequential writes with extra caution until vendor guidance is clear. (windowscentral.com)
Practical checklist (for producers and IT teams)
- 1.) If you already updated and see NDI stutter: change NDI Receive Mode to Single TCP or UDP (Legacy), restart NDI apps, and run a rehearsal. (m.vmix.com)
- 2.) If you haven’t yet updated production hosts: assess risk—install + reconfigure NDI or delay and isolate depending on your security posture and threat model.
- 3.) For managed fleets: pilot KBs on representative AV/NDI hardware, verify storage I/O patterns, and apply Known Issue Rollback/OOB packages where Microsoft recommends them.
- 4.) Keep backups and use the 3‑2‑1 rule before performing heavy writes or resets on hosts updated with the August rollup. (windowscentral.com)
Conclusion
The August 12, 2025 cumulative updates (notably KB5063878 for Windows 11 24H2 and KB5063709 for Windows 10 servicing families) delivered important security fixes but also introduced a clear operational regression for NDI workflows that rely on RUDP. Microsoft has acknowledged the NDI streaming performance issue on its Release Health dashboard and pointed users to vendor guidance; vendors have published practical steps to mitigate the impact by switching NDI Receive Mode to Single TCP or UDP (Legacy) while a permanent remedy is developed. (learn.microsoft.com, m.vmix.com)For production teams the path forward is one of mitigation and prudence: apply the temporary transport change, validate it under show conditions, and balance the security benefits of the August rollup against the very real availability needs of live workflows. Keep an eye on Microsoft’s Release Health updates and vendor advisories for the arrival of a targeted fix, and document every decision to delay or alter patching—both to preserve security posture and to protect live production continuity. (m.vmix.com)
Source: RS Web Solutions Microsoft Confirms Lag Issues in Windows 11 24H2 and Windows 10